Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols

Size: px
Start display at page:

Download "Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols"

Transcription

1 Understanding Spatio-emporal Uncertainty in Medium Access with ALOHA Protocols Affan Syed Wei Ye Bhaskar Krishnamachari John Heidemann University of Southern California Abstract he goal of this paper is to gain deep understanding of how location-dependent propagation latency affects medium access control (MAC) by using ALOHA as a case study. MAC protocols in underwater acoustic networks suffer from latency that is five orders-of-magnitude larger than that in radio networks. Existing work on analyzing MAC throughput in RF networks, where the propagation latency is negligible, generally makes assumptions that render propagation latency irrelevant. As a result, only transmit time is considered as being uncertain in contention-based protocols. We introduce the spatial dimension of uncertainty that is inherent to varying locations of transmitters, resulting in unequal propagation latency to a receiver, where collision occurs. We show through simulation that the benefit of synchronization in slotted ALOHA is lost due to such latency. We propose a modification that adds guard bands to transmission slots to handle spatial uncertainty. We then perform simulation and first order analysis on this modified MAC to find its optimal operating parameters. 1 Introduction Underwater sensor networking (UWSN) is becoming an important area of research [3, 6, 9]. Medium access control (MAC) in underwater networks has attracted strong attention due to its potentially large impact to the overall network performance [11, 8, 15, 5]. he most significant change from traditional radio-frequency (RF) networks to underwater acoustic networks is the change of the medium: acoustic instead of RF electromagnetic wave. he key differences his research is partially supported by the National Science Foundation (NSF) under the grant NeS-NOSS as the SNUSE project, by a hardware donation from Intel Co., and by Chevron Co. through the USC Center for Interactive Smart Oilfield echnologies (CiSoft). Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. o copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. of acoustic networks are propagation latencies five-orders of magnitude greater than RF, and bandwidths one-thousandth that of RF. Both of these factors have significant effects on control algorithms for MAC protocols. ALOHA protocols have been the basis of many wireless MACs since their invention in the 197s [1, 2]. hey are the first class of contention-based MAC protocols in a shared wireless medium. Later protocols, such as carrier sense multiple access (CSMA), achieve better performance than ALOHA in RF networks, due to their conservative mechanism of listening before transmitting [7]. However, carrier sense becomes very expensive in underwater acoustic networks due to the large propogation delay. As shown by Kleinrock and obagi [7], ALOHA protocols are not sensitive to propagation delay. However, this analysis does not consider the varying propagation delays from different locations of nodes, and its results do not completely hold for underwater networks. he goal of this paper is to understand the impact of varying propagation latency on medium access with pure ALOHA and slotted ALOHA as a case study. o do so we use extensive simulation combined with first-order analysis to examine their performance with different parameters. We will show that the location-dependent propagation latency has a fundamental impact on the slotted ALOHA. Furthermore, we explore a method to improve its performance by explicitly handling such propagation delay, and discover best operating parameters. Even though we expect underwater MAC protocols to be more sophisticated than ALOHA, understanding how ALOHA changes from RF to acoustic networks will help understand trends in more complicated protocols. Since the arrival of packet at a node is generally uncertain, traditional MAC try to handle this uncertainty in time using various mechanisms; synchronizing transmission (slotted ALOHA), unique transmission slots (DMA), or sensing channel state before transmission (CSMA [7]). As all such mechanisms are implemented at the transmitter they handle only the transmit time uncertainty. Since the collisions (which impact performance) occur at a receiver, the implicit assumption has always been that these mechanisms are valid at receiver time, i.e. they remove receive time uncertainty. Receive time uncertainty, however, is dependant on both the transmit time (time uncertainty) and relative propagation delay to receiver (space uncertainty) thus we call

2 it space-time uncertainty [12]. We will show, using extensive simulations, that time uncertainty needs to be handled by synchronization while space uncertainty needs additional wait time (guard bands) proportional to the propagation delays. Furthermore, at least for ALOHA and potentially for other MACs, taking care of just one dimension of uncertainty does not provide any benefit. he contribution of this paper is threefold. First, we contribute to an increased understanding of the impact of large and varying propagation delays on medium access in UWSN, and illustrate this impact using ALOHA as a case study. Second, we explore how this uncertainty due to propagation delay can be handled. We propose to add guard bands to transmission slots that maintain the benefit of overlapping packets in single slots at the receiver. Finally, we explore the best operating point for these modified ALOHA and make recommendation based on extensive simulation results and first order analysis. 2 Related Work Recently there has been significant amount of work in designing underwater MAC protocols [11, 8, 12, 1, 13, 15, 5]. his paper however does not attempt to design a new MAC protocol; it attempts to understand and explore the fundamental aspects of medium access that change for the new acoustic medium and propose a framework for analyzing the performance of MAC protocols. Vieira et al. [13] performed simple analysis of slotted ALOHA in underwater networks and reached a conclusion similar to our: slotted ALOHA degrades to pure ALOHA under high latency. However they did not propose a mechanism to handle this degradation, as we do after we were able to identify the cause of this degradation. Xie et al. [15] have compared the performance of ALOHA and CSMA with RS/CS mechanism for underwater networks. Gibson et al. [5] have extended this work to analyze the performance of ALOHA in a linear multi-hop topology. hese papers, however do not attempt to address the following questions: why ALOHA s performance remains same as in RF? why slotted ALOHA s performance degrades to pure ALOHA with any propagation delay? How can this degradation be handled and what are the optimal parameters for it? In this paper we specifically address these questions and provide answers. 3 Spatio-temporal Uncertainty in Medium Access In this section we summarize the concept of space-time uncertainty with regards to medium access, first introduced in a prior work [12]. We then explain the methodology with which we examine its impact on MAC protocols and also the proposed modifications that attempt to remove this uncertainty. 3.1 Space-ime Uncertainty Space-time uncertainty, defined as the two dimensional uncertainty in determining a collision at a particular receiver, is a direct consequence of both the packet transmit time and the propagation latency from transmitters at different locations. raditional analysis considers only the transmit time uncertainty and assumes equidistant receiver, which directly maps the collision at a receiver to the transmit time at all (a) Same transmission time; no (b) Different transmission collision at B time but collision at B Figure 1. Illustration of space-time uncertainty transmitters [7]. Although with an ad hoc network, a receiver cannot be guaranteed to be equidistant to all transmitters, this assumption does not introduce significant errors in RF networks, as the progation latency is very small. However, in underwater networks, we need to consider the packet arrival time at the receiver, which is dependant on both the location of transmitters and their transmit times. his space-time uncertainty can also be viewed as a duality where similar collision scenarios can be constructed by varying either the transmission times or the locations of nodes. Figure 1 illustrates the space-time uncertainty. In Figure 1(a), both nodes A and E transmit packets at the same time. However, instead of causing a collision, both packets are separately received at node B, due to their different arrival times at B. Since classical analysis only considers time uncertainty, it will incorrectly assume that there is a collision. On the other hand, when nodes A and E transmit at different instants, as shown in Figure 1(b), their packets still overlap at B due to their different propagation delays to B. In this case, classical analysis will assume no collision based on different transmit times. herefore, when only time uncertainty is considered, the assumption on collision is wrong for both cases. he duality view of space-time uncertainty is that a collision at B could also have occurred if node D transmitted at a later time than node E. Although, in principle, this uncertainty occurs in all communication, it is only significant in acoustic communication where latency is very large, as we will show in Section he lesson from understanding this two dimensional uncertainty is that we have to take care of both dimensions to obtain guarantees similar to that in handling transmission time in RF networks. As in slotted ALOHA, time synchronization removes the uncertainty in transmit time. We further postulate that adding guard bands to slots (proportional to propagation delay) after transmission helps in reducing the uncertainty due to propagation delay. Larger guard bands increase per packet latency, thus reducing throughput, but also help in decreasing the collision probability at receivers. We explore this tradeoff in greater detail when we propose a modification to slotted ALOHA in Section Evaluation Methodology In order to evaluate the impact of the space-time uncertainty explained above, we consider ALOHA protocols as a case study. We examine their performance with extensive simulation and first-order analysis. ALOHA protocols are the simplest and earliest wireless MAC protocols, allow-

3 ing easy analysis. Just as understanding ALOHA helps in understanding more complex wireless (RF) MAC protocols by providing a framework, we expect our work to be helpful in larger efforts to understand more complex underwater MACs. We run simulations on a custom-built, packet-level simulator designed for UWSN MAC research [12]. Our simulation scenario consists of a single receiver that does not transmit, with nodes randomly deployed in a circular region with a radius equal to the maximum propagation delay. Nodes, with a single packet buffer, transmit based on an offered load to the network modeled as a Poisson process, with mean ranging from to 3 packets/transmission time, and we only observe the packets successfully received at our designated receiver. We choose a single receiver to parallel our analysis of protocol behavior, but have verified that our results hold with packets reception at other nodes in the network. Protocol performance is evaluated through the normalized throughput (to the channel bandwidth). Simulations are run with 32 nodes (unless otherwise noted), representing a reasonable approximation to the infinite node assumption made in classical analysis for the offered load that we consider. Each simulation data point is the averaged result of 25 simulation runs with error bars showing 95% confidence intervals. Our simulator is general enough for different propagation speed in different media (acoustic and RF). o accommodate different transmission ranges and propagation delays, we utilize a normalizing parameter a, defined as the ratio of maximum propagation delay to packet transmission time (the same definition used by Klienrock and obagi [7]). his parameter allows us to investigate the impact of propagation delay without concentrating on a single network deployment. We use a packet length of 1sec (1Kbytes for acoustic modem at 1Kbytes/s), assume speed of sound as 15m/s and alter the maximum range to simulate different delay regimes. 4 Understanding Space-ime Uncertainty with ALOHA he purpose of this section is to understand how time uncertainty is dealt with in classical analysis and how the introduction of space uncertainty affects these results. As described in Section 3.2, we consider ALOHA protocols as a case study for this purpose. We first look at classical analysis of ALOHA protocols that considers only time uncertainty, then introduce pairwise latency to understand the impact of space uncertainty. 4.1 Analysis of ALOHA with ime Uncertainty We first refresh the classical analysis of the simple, or pure ALOHA protocol [4]. where nodes immediately transmit arriving application packets. his analysis is centered at the transmitter and thus only considers time uncertainty. It makes a simplified assumption that all nodes are equidistant to a single receiver, mapping the similar collision scenario from the receiver to the transmitter. It further assumes that there are infinite numbers of nodes, which implies that all Poisson arriving packets are served immediately at different nodes and thus being offered immediately to the network. ime Vulnerability Interval 2 Data (a) Aloha Vulnerability Interval D ata Slot Slot 1 im e (b) Slotted ALOHA Figure 2. Vulnerability intervals for ALOHA and slotted ALOHA ALOHA Slotted ALOHA Figure 3. Classical throughput analysis for ALOHA. he packets that collide are buffered and retransmitted after an exponential delay. he total offered load to the network is thus combination of the Poisson arrival and exponential retransmissions, and is a Poisson process with parameter G. he vulnerability interval (VI) is defined as the time interval relative to a sender s transmission within which another node s transmission causes collision [7]. Assuming as the packet transmission time, Figure 2(a) shows that the VI is equal to 2. Without going into the details, if we normalize to unit time, the throughput of ALOHA becomes [4]: H ALOHA = G e 2G (1) Slotted ALOHA allows transmission only at the start of synchronized slots of length. As Figure 2(b) shows, this synchronization ensures that only interfering packets that arrive in slot will result in a collision. It thus reduces the VI from 2 to by preventing any cross slot overlapping. he throughput of slotted ALOHA is thus increased as [4]: H slotted ALOHA = G e G (2) he analytical results for both protocols is shown in Figure 3, as a reproduction from several early works [4, 7]. Slotted ALOHA achieves maximum normalized throughput of 36.8% at a G of 1 packet/transmit time, while simple ALOHA achieves it maximum of 18.4% at.5 packets/transmit time. As mentioned above, this analysis is carried out with respect to the transmitter s time. he assumption of a single receiver that is equidistant to all transmitters will result in

4 .5 a=.1 a=.5 a=1.5 a=.1 a=.5 a= Figure 4. hroughput of pure ALOHA is not affected by propagation delay Figure 5. hroughput of slotted ALOHA degrades with any propagation latency. a similar vulnerability interval at the receiver regardless of the propagation delay (as shown by Klienrock and obagi [7]). Strictly speaking, these assumptions do not hold for all ad hoc wireless networks, but with short-range RF networks the variation in delay is small enough that it has virtually no effect on performance (for example, 1µs delay over 25m). In satellite networks delay is long, but there is typically only one sender or receiver. We next show, through extensive simulation, that the performance of ALOHA can be significantly affected in acoustic networks where these assumptions do not hold. 4.2 ALOHA with Space Uncertainty In order to understand the impact of location-dependent propagation latency, we now evaluate both simple ALOHA and slotted ALOHA using simulation setup explained in Section 3.2. All nodes have a single packet buffer and the offered load varies as the number of packets offered to the network per packet transmit time Simple ALOHA We first evaluate how the throughput of pure ALOHA is affected by different values of a. Figure 4 shows the simulation results. We can see that the normalized throughput achieved by simple ALOHA remains the same as when no propagation delay is considered, even under different delay regimes. o understand this, we need to look at it from the receiver s perspective in both scenarios: with and without propagation delay. With no propagation delay and packets being transmitted as soon as they arrive, they reach the receiver instantaneously with exactly the same Poisson distribution. Hence the analysis at the transmitter faithfully reflects the situation at the receiver. With different node locations, the arrival time at the receiver will be offset by a constant delay for any transmitter in a particular topology. However, such arrival at the receiver is still a Poisson process with the same parameter as when there is no latency. herefore, from the receiver s perspective, there is no change in probability of collision, and thus the throughput performance is the same as that in Figure 3. We should point A Distance R Global slot Global slot 1 Global slot 2 Data A s Data ime B VI=2 Figure 6. Slotted transmission results in cross slots overlap at receiver. out that simple ALOHA does not even handle time uncertainty, hence further ignoring space uncertainty has no impact due to their duality Slotted ALOHA Next we evaluate how slotted ALOHA performs in different delay regimes. Slotted ALOHA does handle one dimension (time) of uncertainty by synchronizing transmission slots. Since it does not take care of the space uncertainty, our initial intuition is that the impact of this uncertainty will increase with larger values of a. As shown by simulation results in Figure 5, the throughput of slotted ALOHA does degrade to a level similar to simple ALOHA when propagation latency is considered. (A similar observation is made by Vieira et al. [13]). What is more interesting, however, is that such degradation occurs immediately with any propgation delay even when it is very small (a=.1). In order to understand this, we look at how the globally synchronized transmission slots overlap at a receiver. Figure 6 shows how the packets transmitted in transmission slots of nodes A and B overlap at the receiver R. Node

5 Global slot with guard bands A Distance R B Data ßt m ax A s Data im e fraction= fraction=.5 fraction=1 Figure 7. Slotted ALOHA with guard bands. A s transmission in slot 1 can collide with any packet transmitted by node B in slot 1 (arrived at B during slot ) and any one transmitted in slot 2 (arrived at B during slot 1). As long as node A and B are not equidistant to the receiver (or the difference in their propagation delays is an exact multiple of ), either node s transmission can collide with the other s due to a packet arrival during a vulnerability interval of 2. his is the same vulnerability interval as in simple ALOHA, and thus any propagation latency to the receiver completely losses the benefit of time synchronization. If the network always has a single receiver, and nodes knew their relative locations, it is conceivable for slotting to be made relative to the receiver. However this simplification does not match the ad hoc network paradigm where any node can be a potential receiver. Radio networks, although having very small propagation latency, do undergo a similar performance degradation, as we model any packet overlap as collision. However, most RF systems can usually tolerate an overlap of up to a single bit (depending on coding techniques). As a result for high speed RF networks, if bit rate is 1Mb/s (e.g., IEEE 82.11b), the maximum propagation delay that slotted ALOHA can tolerate is 1ns, or 3m in distance. hus such systems do not exhibit the immediate performance degradation that we have shown for any propagation delay. On the other hand, acoustic systems even with low data rate modems (1Kb/s [14]) can tolerate only 1ms or 1.5m in distance due to much slower speed of propagation (about 15m/s). hus the impact of spatial uncertainty for slotted ALOHA will be more evident for any acoustic network than it is for RF networks. 5 Handling Space Uncertainty We now postulate that space uncertainty can be handled by the addition of extra guard bands beyond in slots. hese guard bands are added to ensure that the original single slot overlap is maintained at the receiver. We also look at the optimal length of these guard bands in relation to the propagation delays. Finally we also illustrate that if space uncertainty is handled in this way without synchronizing transmit time (which handles time uncertainty), we do not achieve any benefit. 5.1 Slotted ALOHA with Guard Bands In our modification to slotted ALOHA, nodes still transmit only at the start of globally synchronized slots. he fraction=1 (a) a= fraction=.5 fraction= (b) a=1.2 Figure 8. Slotted ALOHA with guard bands slot duration, however, is increased from to + β τ max, where β represents the fraction of maximum propagation delay (τ max ) that nodes wait after finishing their transmission (Figure 7). Choosing β = 1 ensures that no overlap at the receiver occurs unless packets are transmitted in the same slot, the guarantee that slotted ALOHA was originally designed to achieve when delay is not important. However this results in a long wait time after each packet that will increase packet transmission latency and bandwidth overhead. With β < 1 there remains the possibility that some node pairs still have the vulnerability interval of two slot durations (as in Figure 6). herefore, reducing β value lowers the bandwidth overhead, but increases collision probability. Based on the intuition that the distance between node pairs is often smaller than the maximum propagation delay, we vary β to evaluate the tradeoff between bandwidth overhead and collision probability. Figure 8 shows the simulation results of slotted ALOHA with guard bands at two different delay regimes. We can make three interesting observations from these results. First, using guard bands allows slotted ALOHA to regain a fraction of its lost throughput. Changing the value of β shifts the throughput between that of slotted ALOHA with on delay (maximum throughput of 36.8% at G=1) and simple

6 Slotted ALOHA (no delay) a=.1 Slotted ALOHA (no delay) a=.5 a= a=1 a= β =1 β =.3 β = Pure ALOHA β =.5 Pure ALOHA Guard band fraction β Figure 9. Effect of choosing β length guard bands on throughput capacity a (propagation delay/transmit time) Figure 1. Effect of propagation delay on throughput capacity ALOHA (maximum throughput of 18.4% at G=.5) as in Figure 8(a). Second, the level of improvement is dependant on the choice of β and the propagation delay regime a. With a= (Figure 8(a)) the best curve is within 5% of the performance of slotted ALOHA with no delay, but for a=1.2 (Figure 8(b)) the best curve is within 45%. Finally, the choice of optimal β depends upon a. For a= (Figure 8(a)), the maximum throughput is achieved at β=1; for a=1.2 (Figure 8(b)) however the optimal β is.5. In order to further investigate the parameters β and a, we next look at their individual impact on throughput Impact of Varying Guard Band Length We now look at the maximum achievable throughput, or throughput capacity, that slotted ALOHA can achieve (at an optimal offered load) for a particular value of guard band expressed as a fraction (β) of the maximum propagation delay. Figure 9 shows the results for several different values of a. We can make several observation from this result. First, higher throughput can be achieved using guard bands for lower values of a. his indicates the benefit of short-range communication and long packet duration. For example, assume we use an acoustic modem that has a communication range of 3m and a speed of 1Kb/s [14]. If we use packet length of 25 bytes, a will be, and the modified slotted ALOHA can achieve performance similar to the slotted ALOHA in RF networks. Second, the guard band seldom has to be the maximum propagation delay. A value around.5.6 gives the throughput that is very close to the best value. Reducing guard band from 1 to.5 may largely affect latency. For example, at low loads, the latency can be reduced by half. Finally, for any value of a beyond 1, the benefit of choosing guard band diminishes. For example, with the modem of 1kb/s and the communication range of 3m, the packet length should be larger than 25 bytes (or 2 bits) for visible benefit of using guard bands Impact of Varying Maximum Delay We next vary a to observe how the the throughput capacity is affected by propagation delay in slotted ALOHA modified with guard bands. We want to generate a figure that is similar to Figure 1 in the paper by Klienrock and obagi regarding the impact of propagation delay on throughput capacity for different flavors of CSMA [7]. However, due to their equidistant and single receiver assumption they show that the capacity of slotted ALOHA is not affected by latency, which we have shown to be incorrect for general ad hoc networks in Section Figure 1 shows the throughput capacity for different values of β as we vary the propagation delay. First we observe that beyond βa=1, using different guard bands does not increase the capacity, in fact for certain values of β the capacity is even lower than just using simple ALOHA (as we saw for a=1.2 in Figure 1 when β=1). his is because beyond βa=1 the decrease in probability of collision provided by additional guard bands become constant, while the overhead continues to increase and thus the capacity will only get worse beyond this regime. Furthermore, β =.5 seems to be a good choice over the range of a[,1] as it gives good capacity at lower values of a while not degrading to below simple ALOHA at a= Analysis of ALOHA with Guard Bands We summarize briefly results from a mathematical analysis of the throughput of our modified ALOHA with respect to key parameters. Consider a scenario with a single receiver and n nodes are randomly deployed in a circular region around it. Assume a normalize packet length of 1 second, so that the radius is a constant c (speed of propagation) times a. he pdf of any given node being distance r from the receiver is given thus as: pdf(r) = 2 (c a) 2 r (3) Our analysis is simplified by assuming a Bernoulli arrival process for the n nodes, i.e. each transmits a packet with

7 probability p in a given slot. For large n and low p the results will be similar to the Poisson arrival process that we employed in our simulations. We can derive the expected throughput (S) for n nodes to be: E[number of collision-free packets received per slot] S(p,β,a) = 1 + βa (4) he main result of our analysis is the following proposition: Proposition 1 Assume that a > and βa 1. he expected number of collision-free packets per slot can be represented by a function g(β, p) that is independent of a. As a result the maximum achievable throughput S can be defined as a function of of β and a as follows: S (β,a) = f (β) 1 + βa Where f (β) is defined as the maximum collision probability over all arrival rates p. We omit the details of the proof here due to space constraints, but the core result in this proposition, the independence of the numerator term from a, can BE shown essentially by considering different regions based on whether packet reception can span slot boundaries, and then applying a scaling argument. Equation 5 allows us to make two important inferences about S (β,a) that also corroborate our simulation results in Figure 9 and 1. he first inference is that if β is fixed, then the maximum throughput S 1 (β,a) will go down as 1+βa as we vary a. Equation 5 predicts that for β =.5 and β = 1, the maximum value of throughput at a = 1 will be 2/3 and 1/2 of its value, respectively, at a=ε. Figure 1 corroborates this (we choose ε=.1); for β =.5 a = 1 the throughput is 21.9% approximately 2/3 of the maximum throughput of 32.3% at a =.1. Similarly for β = 1 a = 1 the throughput is 18.6% again approximately 1/2 of the maximum throughput of 37.6% at a =.1. In fact when a=ε, S (β,a) can be approximated as f (β) and so we can observe this function in our numerical results for a=.1 in Figure 9. It can also be deduced from the proposition that if there exists some a for which maximum throughput S (β,a) increases monotonically with respect to β, then it will increase monotonically for all a a. his inference is also corroborated by Figure 9, where we see all curves below a=.5 (which increases monotonically with β) exhibiting this property. 5.2 Simple ALOHA with Guard Bands Since in the previous section we have observed that adding guard bands to slotted ALOHA takes care of space uncertainty, we decided to explore if adding guard bands to simple ALOHA would provide any benefit. Our modification to simple ALOHA results in nodes forming local unsynchronized slots, where they transmit only at the beginning of their slots which posses additional guard bands. However, as Figure 11 shows, simply adding guard bands without slot synchronization are unable to provide any benefit in throughput. he reason is that just as slotted ALOHA without any guard bands takes care of just one dimension (5) a=1 a= a=.1 Figure 11. hroughput performance for unsynchronized slotted ALOHA. of uncertainty (time dimension), this modified version of ALOHA attempts to handle just the space dimension of uncertainty. Similarly, the simple ALOHA with guard bands fails to perform better due to the duality of space and time. herefore, to improve the performance of ALOHA, the uncertainty in both time and space must be handled simultanenously. 6 Future Work his is our initial work in understanding the impact of large, location-dependent latency on MAC protocols in underwater acoustic networks. We plan to rigorously analyze the throughput capacity of our modified slotted ALOHA while removing the assumption regarding single and equidistant receiver made in classical analysis. We also want to observe the impact of choosing different guard bands on the latency and thus make an even stronger recommendation for choosing parameters. We hope that this analysis will provide a framework to analyze other wireless protocols (e.g. CSMA) with delay considerations and increase our understanding of the fundamental characteristics of medium access in UWSN. he impetus for this research arises in the development of an underwater MAC and some of the core design principals developed thereof [12]. 7 Conclusions In this paper we have explored the impact of spatiotemporal uncertainty that exists regarding packet reception in underwater networks. We have shown that without considering location-dependant propagation latency that introduces the spatial dimension of uncertainty, protocols such as slotted ALOHA are significantly affected. Adding guard bands to transmission slots provides an ability to counter this spatial uncertainty. We have also shown that it is necessary to consider both space and time uncertainty while designing MAC protocols under high latency environment of acoustic UWSN. Furthermore we have shown that smaller ratio of propagation delay to packet length result gives better insulation to the impact of spatial uncertainty. he results demonstrate the benefit of short-range communication, where it is possible for our modifed slotted ALOHA to achieve the throughput that is similar to slotted ALOHA in RF networks.

8 8 References [1] Norman Abramson. he ALOHA system. In Proceedings of AFIPS 197 Fall Joint Computer Conference, volume 37, pages , 197. [2] Norman Abramson. Development of the ALOHANE. IEEE ransactions on Information heory, 31(2): , March [3] Ian F. Akyildiz, Dario Pompili, and ommaso Melodia. Underwater acoustic sensor networks: research challenges. Ad Hoc Networks Journal, pages , march 25. [4] Dimitri Bertsekas and Robert Gallager. Data Networks. Prentice Hall, second edition, [5] John H. Gibson, Geoffrey G. Xie, Yang Xiao, and Hui Chen. Analyzing the performance of multi-hop underwater acoustic sensor networks. In Proceedings of the MS/IEEE OCEANS Conference, Aberdeen, Scotland, June 27. [6] John Heidemann, Yuan Li, Affan Syed, Jack Wills, and Wei Ye. Underwater sensor networking: Research challenges and potential applications. In Proceedings of the IEEE Wireless Communications and Networking Conference, Las Vegas, Nevad, USA, April 26. [7] Leonard Kleinrock and Fouad obagi. Packet switching in radio channels: Part I - carrier sense multiple access modes and their throughput delay characteristics. IEEE ransactions on Computing, 23(12): , December [8] Marcal Molins and Milica Stojanovic. Slotted fama: A mac protocol for underwater acoustic networks. In Proceedings of the IEEE OCEANS 6 Asia Conference, Singapore, May 26. [9] Jim Partan, Jim Kurose, and Brian Neil Levine. A survey of practical issues in underwater networks. In WUWNet 6: Proceedings of the 1st ACM international workshop on Underwater networks, pages 17 24, New York, NY, USA, 26. ACM Press. [1] Borja Peleato and Milica Stojanovic. A mac protocol for ad-hoc underwater acoustic sensor networks. In WUWNet 6: Proceedings of the 1st ACM international workshop on Underwater networks, pages , New York, NY, USA, 26. ACM Press. [11] Volkan Rodoplu and Min Kyoung Park. An energyefficient mac protocol for underwater wireless acoustic networks. In Proceedings of the MS/IEEE OCEANS 5 Conference, Washington DC, USA, September 25. [12] Affan A. Syed, Wei Ye, and John Heidemann. -Lohi: A new class of MAC protocols for underwater acoustic sensor networks. echnical Report ISI-R-638, USC/Information Sciences Institute, April 27. [13] Luiz Filipe M. Vieira, Jiejun Kong, Uichin Lee, and Mario Gerla. Analysis of aloha protocols for underwater acoustic sensor networks. Extended abstract in WUWNet 6 Los Angeles, CA, USA, 26. [14] Jack Wills, Wei Ye, and John Heidemann. Low-power acoustic modem for dense underwater sensor networks. In Proceedings of the First ACM International Workshop on UnderWater Networks (WUWNet), page to appear, Los Angeles, California, USA, September 26. ACM. [15] Peng Xie and Jun-Hong Cui. Exploring random access and handshaking techniques in large-scale underwater wireless acoustic sensor networks. In Proceedings of the MS/IEEE OCEANS Conference, Boston, Massachusetts, September 26.

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore,

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut, Storrs,

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Manijeh Keshtgary Reza Mohammadi Mohammad Mahmoudi Mohammad Reza Mansouri ABSTRACT Underwater

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Prasad Anjangi and Mandar Chitre Department of Electrical & Computer Engineering,

More information

MAC Protocol Implementation on Atmel AVR for Underwater Communication

MAC Protocol Implementation on Atmel AVR for Underwater Communication MAC Protocol Implementation on Atmel AVR for Underwater Communication - Final Report- Shaolin Peng speng2@ncsu.edu Introduction Underwater acoustic communication is widely used in many areas to collect

More information

A Hybrid Medium Access Control Protocol for Underwater Wireless Networks

A Hybrid Medium Access Control Protocol for Underwater Wireless Networks A Medium Access Control Protocol for Underwater Wireless Networks Kurtis B. Kredo II Electrical and Computer Engineering Dept. University of California, Davis kbkredo@ucdavis.edu Prasant Mohapatra Computer

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks

A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks Mingsheng Gao Computing Laboratory National University of Singapore mingsh.gao@gmail.com Hui Jiang Department of Computer Science

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Reliable Communication using Packet Coding for Underwater Acoustic Channels

Reliable Communication using Packet Coding for Underwater Acoustic Channels Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Multiplexing Data and Control Channels in Random Access Underwater Networks

Multiplexing Data and Control Channels in Random Access Underwater Networks Multiplexing Data and Control Channels in Random Access Underwater Networks Stefano Basagni ECE Department Northeastern University basagni@ece.neu.edu Chiara Petrioli and Roberto Petroccia Dipartimento

More information

A Survey on Underwater Sensor Network Architecture and Protocols

A Survey on Underwater Sensor Network Architecture and Protocols A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES

PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES P. Vijayalakshmi and V. Rajendran Department of Electronics and Communication Engineering, VELS University,

More information

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1059-1066 Research India Publications http://www.ripublication.com A Review on Efficient Opportunistic Forwarding

More information

Reservation Multiple Access in Underwater Sensor Networks Based on Compressed Sensing

Reservation Multiple Access in Underwater Sensor Networks Based on Compressed Sensing 2013 8th International Conference on Communications and Networking in China (CHINACOM) Reservation Multiple Access in Underwater Sensor Networks Based on Compressed Sensing Shuo Shi, Xue Wang and Xuemai

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Cross-layer Energy Minimization for Underwater ALOHA Networks

Cross-layer Energy Minimization for Underwater ALOHA Networks Cross-layer Energy Minimization for Underwater ALOHA Networks Mehmet Koseoglu, Ezhan Karasan, Member, IEEE, Lin Chen, Member, IEEE Abstract Underwater networks suffer from energy efficiency challenges

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Choosing the Packet Size in Multi-hop Underwater Networks

Choosing the Packet Size in Multi-hop Underwater Networks Choosing the Packet Size in Multi-hop Underwater Networks Stefano Basagni, Chiara Petrioli, Roberto Petroccia and Milica Stojanovic ECE Department Northeastern University {basagni, millitsa}@ece.neu.edu

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

Efficient Surface Gateway Deployment. For Underwater Sensor Networks

Efficient Surface Gateway Deployment. For Underwater Sensor Networks 1 Efficient Surface Gateway Deployment For Underwater Sensor Networks Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut,

More information

UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test

UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test Haining Mo, Ahmet Can Mingir, Hesham Alhumyani, Yusuf Albayram, and Jun-Hong Cui Computer Science & Engineering Department,

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Distributed Scheduling and Routing in Underwater Wireless Networks

Distributed Scheduling and Routing in Underwater Wireless Networks Distributed Scheduling and Routing in Underwater Wireless Networks Kurtis Kredo II Electrical and Computer Engineering Dept. California State University, Chico kkredo@csuchico.edu Prasant Mohapatra Computer

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Kiran Yedavalli and Bhaskar Krishnamachari Department of Electrical Engineering - Systems University of Southern California, Los

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Design and Simulation of an Underwater Acoustic Local Area Network

Design and Simulation of an Underwater Acoustic Local Area Network Design and Simulation of an Underwater Acoustic Local Area Network Ethem M. Sozer, Milica Stojanovic, and John G. Proakis Northeastern University, Communications and Digital Signal Processing Center 409

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Medium Access Control

Medium Access Control Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

TAMING THE BEAST, TACKLING MEDIA ACCESS CONTROL (MAC) ISSUES FOR UNDERWATER ACOUSTIC SENSOR NETWORKS

TAMING THE BEAST, TACKLING MEDIA ACCESS CONTROL (MAC) ISSUES FOR UNDERWATER ACOUSTIC SENSOR NETWORKS MILCIS2007, CANBERRA, 20-22 NOVEMBER 2007 1 TAMING THE BEAST, TACKLING MEDIA ACCESS CONTROL (MAC) ISSUES FOR UNDERWATER ACOUSTIC SENSOR NETWORKS Xiaoxing Guo, Michael R. Frater, and Michael J. Ryan 1 Abstract.

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Efficient Error Recovery Using Network Coding in Underwater Sensor Networks

Efficient Error Recovery Using Network Coding in Underwater Sensor Networks Efficient Error Recovery Using Network Coding in Underwater Sensor Networks Zheng Guo, Bing Wang, and Jun-Hong Cui Computer Science & Engineering Department, University of Connecticut, Storrs, CT, 06269

More information

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks

Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks Yashar M. Aval, Yu Han, Andrew Tu, Stefano Basagni, Milica Stojanovic and Yunsi Fei Department

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks

Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks Testbed-based Performance Evaluation of Handshake-free MAC Protocols for Underwater Acoustic Sensor Networks Yashar M. Aval, Yu Han, Andrew Tu, Stefano Basagni, Milica Stojanovic and Yunsi Fei Department

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

Node Discovery and Localization Protocol for Mobile Underwater Sensor Networks

Node Discovery and Localization Protocol for Mobile Underwater Sensor Networks Node Discovery and Localization Protocol for Mobile Underwater Sensor Networks # Swathi Lakum 1 M.Tech, Computer Science Engineering, lakumswathi@gmail.com # Prasad Goranthala 2, Assoc. Professor, Department

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Channel-Hopping Multiple Access

Channel-Hopping Multiple Access Channel-Hopping Multiple Access Asimakis Tzamaloukas and J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering University of California, Santa Cruz, California 9564 jamal,

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.

P B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR. 1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of

More information

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob

G 364: Mobile and Wireless Networking. CLASS 2, Wed. Jan Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob G 364: Mobile and Wireless Networking CLASS 2, Wed. Jan 7 2004 Stefano Basagni Spring 2004 M-W, 11:40am-1:20pm, 109 Rob Wireless Issues Architecture, communication model and duplexing define the framework

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless

More information

MAC PROTOCOLS FOR MONITORING AND EVENT DETECTION IN UNDERWATER NETWORKS EMPLOYING A FH-BFSK PHYSICAL LAYER

MAC PROTOCOLS FOR MONITORING AND EVENT DETECTION IN UNDERWATER NETWORKS EMPLOYING A FH-BFSK PHYSICAL LAYER MAC PROTOCOLS FOR MONITORING AND EVENT DETECTION IN UNDERWATER NETWORKS EMPLOYING A FH-BFSK PHYSICAL LAYER Federico Guerra a, Paolo Casari a, Michele Zorzi a a All authors are with the Department of Information

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

QUT Digital Repository:

QUT Digital Repository: QUT Digital Repository: http://eprints.qut.edu.au/ Gui, Li and Tian, Yu-Chu and Fidge, Colin J. (2007) Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. In

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Network Coding Schemes for Underwater Networks

Network Coding Schemes for Underwater Networks Network Coding Schemes for Underwater Networks The benefits of implicit acknowledgement Daniel Lucani Muriel Médard Milica Stojanovic Massachusetts Institute Of Technology dlucani@mit.edu medard@mit.edu

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

Capacity of a Relay Acoustic Channel

Capacity of a Relay Acoustic Channel Capacity of a Relay Acoustic Channel Milica Stojanovic Massachusetts Institute of Technology millitsa@mit.edu Abstract A relay acoustic link consisting of N hops spanning a fixed distance d is considered.

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information